Cheat Sheet Network Proprofs
Short Description
Download Cheat Sheet Network Proprofs...
Description
Networking Facts A network is network is a group of computers (often called nodes or hosts) hosts) that can share information information through through their interconnect interconnections. ions. A network network is made up of the following components: •
Computer systems (nodes or hosts)
•
Transmission media--a path for electrical signals between devices
•
Network Network interfaces interfaces--dev --devices ices that send and receive receive electrical electrical signals
•
Prot Protoc ocol olss--r -rul ules es or stan standa dard rds s communicate and exchange data
that that
desc describ ribe e
how how
host hosts s
There are several ways to classify networks. The following table lists several ways to describe a network. Network Network Type Type Descripti Description on Host Role In a peer to peer network, the hosts provide and consume network services, and each host has the same operating system. Advantages of peer to peer networks include:
Peer-to-Peer
•
Easy implementation
•
Inexpensive
Disadvantages of peer to peer networks include: •
Difficult to expand (not scalable)
•
Difficult to support
•
Lack centralized control
•
No centralized storage
In a client/server network, hosts have specific roles. For example, some hosts are assigned server roles which allows them to provide network resources to other hosts. Other hosts are assigned client roles which allows them to consume network resources. Unlike peer to peer networks, hosts in a client/server network have different operating systems.
Baseband
Baseband signaling allows one signal at a time on the network medium (cabling).
Broadband
Broadband signaling divides the network medium into multiple channels, allowing several signals to traverse the medium at the same time.
Networking Configuration Network architecture is a set of standa standards rds for how compute computers rs are physically connected and how signals are passed between hosts. Some typical network architectures are described in the table below. Network Architecture
Description
Ethernet
Ethernet is a wired networking standard and is the most common networking architecture used in LANs.
Dial-up Modem
Dial-up networking is a common way to connect a computer to a remote network, such as the Internet. A modem on each computer uses the phone lines to send and receive data.
DSL is a fast-growing alternative to dial-up networking DSL (Digital to connect to the Internet. DSL uses regular phone Subscriber Line) lines to send digital broadband signals.
Asymmetrical DSL (ADSL)
ADSL offers differing upload and download speeds and can be configured to deliver up to six megabits of data per second (6000K) from the network. network. ADSL enables voice and high-speed data to be sent simultaneously over the existing telephone line.
Rate Adaptive DSL (RADSL)
A non-standard version of ADSL. Note that standard ADSL also permits the ADSL modem to adapt speeds of data transfer.
Very High Bit Rate DSL (VDSL)
Up to 26 Mb/s, over distances up to 50 Meters on short loops such as from fiber to the curb. In most cases, VDSL lines will be served from neighbourhood cabinets that link to a Central Office via optical fiber. VDSL is currently being introduced in market trials to deliver video services over existing phone lines. VDSL can also be configured in symmetric mode.
High Data Rate DSL (HDSL)
This variety created in the late 1980s delivers symmetric service at speeds up to 2.3 Mbps in both directions. Available at 1.5 or 2 .3 Mbps, this symmetric fixed rate application does not provide standard telephone service over the same line and is already standardized through ETSI and ITU (International Telecommunications Union). Seen as an economical replacement for T1 or E1, it uses one, two or three twisted copper pairs.
Integrated Services Digital Network DSL (IDSL)
This is a form of DSL that supports symmetric data rates of up to 144 Kbps using existing phone lines. It is unique in that it has the ability to deliver services through a DLC (Digital Loop Carrier: a remote device often placed in newer n eighborhoods to simplify the distribution of cable and wiring from the phone company).
Advantages of client/server networks include: Client/Server
•
Easily expanded
•
Easy to support
•
Centralized services
•
Easy to backup
Disadvantages of client/server networks include: •
Server operating systems are expensive
•
Requires extensive advanced planning
Geography and Size LANs reside in a small geographic area, like in an office. Local Area A series of connected LANs, or a LAN connected across Network (LAN) several buildings or offices, is called an internetwork . Wide Area Network (WAN)
A WAN is a group of LANs that are geographically isolated but connected to form a large internetwork.
Participation
Private
A LAN or WAN for private individual or group use which may or may not be secure. Examples include home and organization networks. Intranets and extranets, extranets, although related to the Internet, are private networks. Both an extranet and intranet are tightly controlled, and made available only to select organizations. An extranet is made available to the public and an intranet is made available internally.
Public
A large collection of unrelated computers, with each node on the network having a unique address. The Internet, for example, is a public n etwork.
ISDN is another alternative to traditional dial-up that can be used to connect to the Internet or to directly communicate with another computer connected to the ISDN network. ISDN can use regular telephone wiring, ISDN (Integrated but must be connected to a special ISDN network. Services Digital • BRI ISDN is 2 “B” Channels at 64Kbps for a total Network) of 124Kbps (BRI=Basic Rate Interface) •
Wireless
PRI ISDN also known as T1 is 23”B” Channels and one 64Kpbs “D” Channel (PRI=Primary Rate Interface)
Wireless networking uses radio waves or i nfrared light to send data between hosts. Most wireless networks connect into larger wired networks which are in turn connected to the Internet.
Signaling
Network+ N10-003 Cheat Sheet
Page 1
You do not need to know what each each type of DLS is or does. You may be asked to select what are valid DSL types from a list.
Note:
A mesh topology exists when there are multiple paths between any two nodes on a network. Mesh topologies are created using point-to-point connections. This increases the network's fault tolerance because alternate paths can be used when one path fails. Two variations of mesh topologies exist:
Communication between hosts on a network generally takes one of three forms: •
Simplex--one-way communication communication from a sender to a receiver.
•
Half-d Half-dupl uplexex--t -twowo-way way commun communica icatio tion n betwee between n two Communication only travels in one direction at a time.
•
hosts hosts..
Duplex--two-way communication between hosts. Communication can travel in both directions simultaneously.
•
Mesh
Topology Facts Topology is Topology is the term used to describe how devices are connected and how messages flow from device to device. There are two types of network topologies: •
The physical topology describes the physical way the network is wired.
•
The logical topology describes the way in which messages are sent.
The following table describes several common physical topologies. Topolo Topology gy Descri Descripti ption on A physical bus topology consists of a trunk cable with nodes either inserted directly into the trunk, or nodes tapping into the trunk using offshoot cables called drop cables.
Bus
•
Signals travel from one node to all other nodes on the bus.
•
A device called a terminator is terminator is placed at both ends of the trunk cable.
Terminators absorb signals and prevent them from reflecting repeatedly back and forth on the cable. The physical bus: •
•
Requires less cable than the star
•
Can be difficult to isolate cabling problems
•
A ring topology connects neighboring nodes until they form a ring. Signals travel in one direction around the ring. In ring topologies, each device on the network acts as a repeater to send the signal to the next device. With a ring:
•
Instal Installat lation ion requir requires es carefu carefull planni planning ng to creat create e a continuous ring.
•
Isolating problems can require going to several physical locations along the ring.
•
A malfu malfunct nction ioning ing node node or cable cable break break can preven preventt signals from reaching nodes further along on the ring.
•
MSAU’ MSAU’s s use “RING “RING IN” and “RING “RING OUT” OUT” ports ports for multiple multiple MSAU’s. MSAU’s. These need need to be configured configured in the proper order. With multiple MSUA’s MSUA’s the “ring out” needs to connect to the “ring in” in order to complete the ring.
•
Adding a work station to a physical ring topology will disconnect all clients from the network.
•
Token Token Ring Ring 802.5: 802.5: Rememb Remember er that that Token Token Ring Ring networks do not have any collisions as they use a token pass to to communicate. communicate. Questions regarding networks networks where where no collisions collisions are the highest highest priority could be referring referring to Token Token Ring. A Token Ring network network also provides equal access to all computers.
Ring
A star star topolo topology gy uses uses a hub (or switc switch) h) to concen concentra trate te all network connections to a single physical location. With the star: •
All network connections are located in a single place, which makes it easy to troubleshoot and reconfigure.
•
Nodes can be added to or removed from the network easily.
•
Cabling problems usually affect only one node.
•
Requires Requires more cable than any other topology. topology. Every node has its own cable.
Star
Network+ N10-003 Cheat Sheet
Partial Mesh--Some redundant paths exist.
Full Mesh--Every node has a p oint-to-point connection with every other node. Full mesh topologies are u sually impractical because the number of connections increases dramatically with every new node added to the network. However, a full mesh topology becomes more practical through the implementation of an adhoc wireless network. With this topology, every wireless network card can communicate directly with any other wireless network card on the network. A separate and dedicated network interface and cable for each host on the network is not required. •
Logical Topologies A logical topology is the way that the signals act on the network media, or the way that the data passes through the network from one device to the the next next withou withoutt regard regard to the the physic physical al interc interconn onnect ection ion of the devices. Logical topologies are bound to the network protocols that direct how the data moves across a network. In the Bus Logical Topology each time a node on the network has data for another node; the sending node broadcasts the data to the entire network. The various nodes hear hear it and look to to see if the data data is for them. If so, they keep the data. data. If not they ignore ignore the data. data. Ethernet is the best known example example of a logical bus network. LocalTalk is also another example of a logical bus network. In the Ring Logical Topology Topology only one node can send informat information ion across the network at any given time. This is achieved by way of a token. token. The Token Ring and Fiber Distribut Distributed ed Data Interface Interface are examples of a Logical Ring Network Note: Remember if you see logical in the question about a 10BaseT, 100BaseT network it is referring to the bus topology. To connect to a TCP/IP network you do not need a default Gateway, unless you are required to connect to the Internet or another network, to be entered into the client configuration. configuration. Only an IP address and a subnet mask are required to be able to communicate on the network. A default gateway is required for access to another network such as the internet. 100VG-anyLAN IEEE 802.12 also called Demand Priority. The VG stands for Voice Grade the 100 is obviously 100Mbps while the “anylan” part refers to the ability to work within just about any Ethernet Ethernet LAN technology. technology. Questions about this topic may include what method access is used by 100VG 100VG-an -anyLA yLAN. N. The differ differenc ence e here is Demand Demand Priority Priority over CMSA/CD that is part of 802.3 Ethernet protocol. Twisted Pair Facts Twisted pair cables support a wide variety of fast, modern network stan standa dard rds. s. Twis Twiste ted d pair pair cabli cabling ng is comp compos osed ed of the the foll follow owin ing g components: •
Two wires that carry the data signals (one conductor carries a positive signal; one carries a negative signal). They are made of 22 or 24 gauge copper wiring.
•
PVC or plenum plastic insulation surrounds each wire. Plenum cable is fire resistant and non-toxic. It must be used when wiring above above ceiling ceiling tiles. PVC cable cannot be used to wire above ceilings because it is toxic when burned.
•
Two wires are twisted to reduce the effects of electromagnetic interference (EMI) and crosstalk . Because the wires are twisted, EMI should affect both wires equally and can be cancelled out.
•
Multi Multiple ple wire wire pairs pairs are bundle bundled d toget together her in an outer outer sheath sheath.. Twisted pair cable can be classified according to the makeup of the outer sheath:
Page 2
o
o
Shielded Twisted Pair (STP) has a grounded outer copper shield around the bundle of twisted pairs or around each pair. This provides added protection against EMI. Unshielded Twisted Pair (UTP) does not have a grounded outer copper shield. UTP cables are easier to work with and are less expensive than shielded cables.
The table below describes the different unshielded twisted pair (UTP) cable types (categories). Type
Connec to tor Descrip ti tion
Phone cable
RJ-1 RJ-11 1
Cat 3
RJ-45
Designe d for us use wi with 10 10 me megabi t Ethe rn rnet or or 16 16 megabit token ring.
Cat 5
RJ-45 -45
Suppor pportts 100 100 mega egabit bit and 1 giga gigabi bitt Ether hernet net and and ATM networking.
Cat Cat 5e 5e
RJ-4 RJ-45 5
Simi Simila larr to to Cat Cat 5 but but prov provid ides es bett better er EMI EMI prot protec ecti tion on.. Supports 1 and 10 gigabit Ethernet (gigabit connections require the use of all four twisted pairs).
Used Used to conn connec ectt a PC to a pho phone ne jack jack in a wal walll outlet to establish a dial-up Internet connection. Has two pairs of twisted cable (a total of 4 wires).
Cat 6
RJ-45
Supports hi high-bandwidth, br broadband communications.
Cat-6 STP
RJ-4 RJ-45 5
Used Used for for dat data tran transm smis issi sion ons. s. Supp Suppor orts ts up to to 600 600 MHz and used in Ethernet, Fast Ethernet, Gigabit Ethernet, Token Ring, and 155 Mbps ATM.
The easiest way to create a crossover crossover cable is to arrange the wires in the first connector connector using the T568A standard standard and arrange arrange the wires in the second second connector using the T568B standard.
Ethernet specifications use the following pins (Tx is a pin used for transmitting and Rx is a pin used for receiving): •
Pin 1: Tx+
•
Pin 2: Tx-
•
Pin 3: Rx+
•
Pin 4: Unused
•
Pin 5: Unused
•
Pin 6: Rx-
•
Pin 7: Unused
•
Pin 8: Unused
Coaxial Cable Facts Coaxial cable is an older technology that is usually implemented with a bus topology. It is not suitable for ring or star topologies because the ends ends of the the cabl cable e must must be term termin inat ated ed.. It is comp compos osed ed of two two conductors, which share a common axis, within a single cable. Coaxial cable is built with the following components: •
Two concentric metallic conductors: The inner conductor conductor,, which carries carries data signals. It is o made of copper or copper coated with tin. The mesh conductor is a second physical channel that o also grounds the cable. It is made of aluminum or copper coated tin.
•
The insulator, which surrounds the inner conductor, keeps the signal separated from the mesh conductor. It is made of PVC plastic.
•
The mesh conductor, which surrounds the insulator and grounds the cable. It is made of aluminum or copper coated tin.
•
The PVC sheath, which is the cable encasement. It surrounds and protects the wire. It is made of PVC plastic.
The table below describes describes the two types of connector connectors s used with twisted pair cables. Conne onnect ctor or RJ-11
RJ-45
Des Descri criptio ption n •
Has 4 connectors
•
Supports up to 2 pairs of wires
•
Uses Uses a lockin locking g tab to keep keep connec connector tor secure secure in outlet
•
Used primarily for telephone wiring
•
Has 8 connectors
•
Supports up to 4 pairs of wires
•
Uses Uses a lockin locking g tab to keep keep connec connector tor secure secure in outlet
•
Used for Ethernet and some token ring connections
Each type of UTP cable can be substituted for any category below it, but never for a category above. For example, Cat 6 can be substituted for a task requiring Cat 5e; however, neither Cat 5 nor Cat 3 should be used for this particular task. Making Cable Facts Twisted pair cables remain one of the primary ways that computers connect to a network. Computers connect to the network through a hub or switch with a straight-through cable. Computers can connect directly to one another using a crossover cable.
Coaxial cable has the following advantages and disadvantages: Advantages
Disadvantages
Description
Grade
•
Network+ N10-003 Cheat Sheet
T568 T568AA--T -To o use use this this stan standa dard rd,, arrange the wires from pins 1 to 8 in each connector in the following orde order: r: GW, GW, G, OW, B, BW, O, BrW, Br. T568 T568BB--T -To o use use this this stan standa dard rd,, arrange the wires from pins 1 to 8 in each connector in the following orde order: r: OW, OW, O, GW, B, BW, G, BrW, Br.
•
Highly resistant to physical damage
•
Expensive
•
Inflexible construction (difficult to install)
•
Unsupported by newer networking standards
Uses •
RG-58
There are two standards for creating creating straight-through cables: •
Highly resistant to EMI (electromagnetic interference)
The table below describes the different coaxial cable grades.
The table below illustrates both straight-through and crossover cable configurations. Cable
•
•
10Base2 Ethernet networking (also known as Thinnet)
Resistance Rating
50 ohms
Limited to 185 meters
RG-59
Cable TV and cable networking
75 ohms
RG-6
Satellite TV
75 ohms
•
RG-8 •
10Base5 Ethernet networking (also known as Thicknet)
50 ohms
Limited to 500 meters
Page 3
The table below describes the types of connectors used with coaxial cable. Connector
Description
F-Type
BNC
•
Twisted onto the cable
•
Used to create cable and satellite TV connections
•
Used to hook a cable modem to a broadband cable connection
•
Also referred to as ‘T Connectors’
•
Molded onto the cable
•
Used in 10Base2 Ethernet networks
•
DB15 serial connector
•
Used in 10Base5 Ethernet networks
AUI
Fiber Optic Facts To connect computers using fiber optic cables, you need two fiber strands. One strand transmits signals, and the other strand receives signals. Fiber optic cabling is composed of the following components: •
The core carries the signal. It is made of plastic or glass.
•
The cladding maintains the signal in the center of the core as the cable bends.
•
The sheathing protects the cladding and the core.
Subscriber Connector (SC)
Fiber optic cabling offers the following advantages and disadvantages: Advantages
Disadvantages
•
Totally immune to EMI (electromagnetic interference)
•
Highly resistant to eavesdropping
•
Supports extremely high data transmission rates
•
Allows greater cable distances without a repeater
•
Very expensive
•
Difficult to work with
•
Special training required to attach connectors to cables
•
Also called a push in and twist connector
•
Each wire has a separate connector
•
Nickel plated with a ceramic ferrule to insure proper core alignment and prevent light ray deflection
•
As part of the assembly process, it is necessary to polish the exposed fiber tip to ensure that light is passed on from one cable to the next with no dispersion
•
Used with single- and multi-mode cabling
•
Push on, pull off connector type that uses a locking tab to maintain connection
•
Each wire has a separate connector
•
Uses a ceramic ferrule to insure proper core alignment and prevent light ray deflection
•
As part of the assembly process, it is necessary to polish the exposed fiber tip
•
Used with single- and multi-mode cabling
•
Composed of a plastic connector with a locking tab, similar to a RJ-45 connector
•
A single connector with two ends keeps the two cables in place
•
Uses a ceramic ferrule to insure proper core alignment and prevent light ray deflection
•
Half the size of other fiber-optic connectors
Lucent Connector (LC)
Multi-mode and single mode fiber cables are distinct from each other and not interchangeable.
•
Used with single and multimode cabling
•
Composed of a plastic connector with a locking tab
•
Uses metal guide pins to ensure it is properly aligned
The table below describes multi-mode and single mode fiber cables. Type
Single Mode
Multimode
Mechanical Transfer-Registered Jack Connector (MT-RJ)
Description •
Transfers data through the core using a single light ray (the ray is also called a mode)
•
•
The core diameter is 8 to 10 microns and 125 micron cladding
A single connector with one end holds both cables
•
•
Supports a large amount of data
•
Cable lengths can extend a great distance
Uses a ceramic ferrule to insure proper core alignment and prevent light ray deflection
•
Full duplex
•
Connectors are: MT-RJ and LC
•
Transfers data through the core using multiple light rays
•
The core diameter is 50 to 100 microns and 125 micron cladding
•
Cable lengths are limited in distance (550 meters)
•
Full duplex
Fiber optic cabling uses the following connector types: Type Straight Tip (ST) Connector
Description •
•
Network+ N10-003 Cheat Sheet
Used with single and multi-mode cabling Keyed, bayonet-type connector
802.3z The Gigabit Ethernet SX feature is a TCP/IP attachment that offers high-speed data transfers using multi-mode optical fiber . 1000BASESX USB and FireWire Facts You can create a network connection between two PCs by plugging a USB cable into their USB ports. You can also use software that allows you to connect multiple PCs through a USB hub. USB is a serial communication specification. There are two USB versions: •
USB 1.0 runs at 12 megabits per second.
•
USB 2.0 runs at 480 megabits per second.
The table below describes the three types of USB connectors. Connector
Description
Page 4
A Connector
•
Generally plugs directly into the computer or a hub
•
To connect two computers together directly, select a USB cable with two A connectors
•
Generally plugs into a hub, printer, or other peripheral device to connect the device to the computer
•
Most USB cables have an A connector on one end (to connect to the cable) and a B connector on the other end (to connect to the device)
B Connector
•
Designed to plug in to devices with mini plugs such as a digital camera
•
Most USB cables with a mini connector have an A connector on the other end to connect to the computer
Mini Connector
You can also create a network connection between two PCs using their FireWire (IEEE 1394) ports. The table below describes Firewire and its connectors. Connector
in the original assignment can apply for a new MAC address assignment. A NIC communicates across the network using the following method: 1. The NIC receives data from the PC. 2. The NIC breaks the data into frames, which include the following information: o The receiving NIC's MAC address o The sending NIC's MAC address The data it is transmitting The CRC (cyclic redundancy checking) which is used to verify correct transmission and reception of the data The NIC encodes the frames as electrical or light impulses and transmits them across the network. The receiving NIC verifies the NIC addresses and CRC. The receiving NIC tracks the frames and reassembles the data. The receiving NIC sends the data to the PC. o o
3. 4. 5. 6.
Network Connection Device Facts The following table lists several common connection devices used within a LAN. Device
A hub is the central connecting point of a physical star, logical bus topology. Hubs manage communication among hosts using the following method:
Description
6-pin Connector
•
Supports data transfer speeds at upwards of 400 Mbps
•
6-pin connector is used when making connections between PCs
•
4-pin connector is used to connect to peripheral devices
4-pin Connector
Hub
Component Description These connect the network interface and host to the network media.
This visually indicates the network connection status. Link indicator Green generally indicates a good connection, and red or an unlit diode indicates a bad connection.
Switch
MAC Address The MAC address is a unique hexadecimal identifier burned into the ROM (physically assigned address) of every network interface. •
The MAC address is a 12-digit hexadecimal number (each number ranges from 0-9 or A-F).
•
The address is often written as 00-B0-D0-06-BC-AC or 00B0.D006.BCAC, although dashes, periods, and colons can be used to divide the MAC address parts.
•
The MAC address is guaranteed unique through design. The first half (first 6 digits) of the MAC address is assigned to each manufacturer. The manufacturer determines the rest of the address, assigning a unique value which identifies the host address. A manufacturer that uses all the addresses
Network+ N10-003 Cheat Sheet
A host sends a frame to another host through the hub.
•
The hub duplicates the frame and sends it to every host connected to the hub.
•
The host to which the frame is addressed accepts the frame. Every other host ignores the frame.
Switches provide functionality similar to hubs, but typically on a larger scale and with higher performance (A switch offers guaranteed bandwidth to each port). Unlike a hub, a switch forwards frames only to the intended host, not every host connected to the switch. A switch builds a database based on MAC addresses to make forwarding decisions.
The table below describes the components of an Ethernet NIC.
A NIC's transceiver is responsible for transmitting and receiving network communications. To send signals to the network, it converts digital data from a PC to digital signals. The type of signal the transceiver sends depends Transceiver on the type of network. A fiber optic NIC sends light signals; an Ethernet NIC sends electronic signals. To receive signals, the transceiver converts digital signals from the network to digital data for the PC.
•
Active VS’s Passive hubs – Active hubs regenerate the signals while passive hubs do not. Active hubs are generally more expensive than passive hubs. Both passive and active hubs work at the physical layer (layer1) of the OSI model. Use crossover cables and not patch cables to connect multiple hubs together.
Network Adapter Facts A network adapter connects a host to the network medium. Some computers, like laptops, come with built-in network adapters. Other computers use NICs (network interface cards) that plug in to the system's expansion slots or which are external to the computer and connect through an existing computer port. A common network interface card is one used on an Ethernet network.
Media connectors
Description
•
The process begins by examining the source address of an incoming packet. If the source address is not in the forwarding database, an entry for the address is made in the database. The port it came in on is also recorded.
•
The destination address is then examined. If the destination address is not in the database, o the packet is sent out all ports except for the one on which it was received. If the destination address is in the database, the o packet is forwarded to the appropriate port if the port is different than the one on which it was received. o Broadcast packets are forwarded to all ports except the one on which they were received.
Eventually, a switch learns the location of all devices on the network. Incoming frames are then sent directly to the switch port to which a specific host is connected. Bridge
Bridges connect separate media segments (networks) that use the same protocol. Like a switch, bridges use MAC addresses to determine a frame's destination and to build a table of device addresses and their corresponding segments. This also allows a bridge to prevent messages within a media segment from crossing over to another segment. This keeps the network from wasting bandwidth by eliminating unnecessary traffic between segments. If a bridge does not
Page 5
have the destination address in its forwarding table, then it will forward it to all ports except the originating port. A transparent bridge can be used to segment a network. It’s called transparent because other devices on the network do not need to be aware of it. This would be used to relieve congestion on a network by segmenting it.
The following table is a quick reference guide to network devices. Device
A wireless access point (WAP) is a hub for a wireless network. A WAP works like a hub except that hosts connect using radio waves instead of wires. Note: A WAP can have ports that interface with a wired portion of a segment, allowing you to connect the WAP to the wired network. Some WAPs even have built-in wired hubs or switches.
Internetwork Device Facts In a broad sense, the term network can describe any collection of devices connected together to share information and resources. For example, the Internet is a worldwide network linking computers so they can share resources. The telephone company is another type of network, connecting phones and providing services. Likewise, the term internetwork might mean connecting two separately managed networks together, or it might mean connecting two network segments together. Devices such as hubs, switches, and bridges connect multiple devices to the same network segment. Internetwork devices connect multiple networks or subnets together, and enable communication between hosts on different types of networks.
Hub
Switch
Connects all nodes/segments in a network together; filters and forwards packets; isolate collision domains
Layer 2
multiport bridge, configure VLANs
Bridge
Connects 2 network segments with dissimilar media types; isolate collision domains within a segment
Layer 2
wired or wireless
Router
Connects 2 networks with different topologies; maps Layer 3 nodes & routes packets; isolates broadcast domains
Brouter, IOS
Gateway
Connects 2 networks with different protocols or technologies; could be hardware or software
Layer 4, 5, 6, 7
connection to ISP, PABX
NIC
An expansion card installed in a device to connect/interface to the network; particular to media & protocol
Layer 1, 2
PCI, USB, PCMCIA, builtin M/B
CSU/DSU
A 2 in 1 device used to connect a digital carrier to the network equipment; provides diagnostics & buffering
-
T1, T3; V.35 interface
ISDN adapter
The terminal adapter used to connect to the internet via ISDN technology
-
BRI TA
WAP
A device used to connect mobile PCs to a wired network wirelessly via RF technology
Layer 1, 2
infrastructure mode, WiFi
Modem
A device that changes digital to analog signal and vice versa; modulator/demodulator
-
POTS (V.92), xDSL, cable
-
media converter, DIX/AUI
-
port blocking, packet filtering, proxy server, DMZ
Description
A gateway is a generic term used to describe any device that connects one administratively managed network with another. For example, a gateway connects a business network to the Internet. The gateway device controls the flow of data between the two networks. In addition, the term gateway is often used Gateway to describe a specialized device that translates data sent between two networks using different protocols. Gateways work on the top 3 layers of the OSI and are required input within the TCP/IP setting for a client for connection to another network such as the Internet. A router is a device that connects two or more network segments or subnets.
Router
•
Each subnet has a unique, logical network address.
•
Routers can be used to connect networks within a single LAN, or they can be used as gateways to connect multiple LANs together.
•
Routers can be used to connect networks with different architectures (such as connect an Ethernet network to a token ring network).
In addition to simply linking multiple subnets together, routers keep track of other subnets on the internetwork and decide the direction data should travel to reach the destination. A firewall is a router with additional security features. Firewalls can be programmed with security rules to restrict the flow of traffic between networks. •
A firewall can control the type of traffic allowed in to a network and the type of traffic allowed out of a network.
•
Rules set up on the firewall determine the types of permitted and prohibited traffic.
•
A firewall can be either hardware devices or software installed onto operating systems.
Firewall
Note: There are also some switches (called Layer 3 switches) that have built-in router functionality. These switches examine the logical network address (instead of the MAC address) to switch packets between networks.
Network+ N10-003 Cheat Sheet
Remarks concentrator (passive), repeater (active), MAU
The following table lists several common internetworking devices. Device
Operation
Connects all nodes in a network together; transmissions received in 1 Layer 1 port are rebroadcast to all ports
Translational bridges are used when you need to translate data from one format to another across segments. Wireless Access Point (WAP)
Purpose
A device that transmits or receives analog or digital Transceiver signals; allows a NIC to connect to a different media type
Firewall
A stand-alone device or software used to protect networks from spyware, hackers, worms, phising, trojans
Ethernet Facts Ethernet is the most popular networking architecture for LANs. It offers high performance at a low cost and is easy to install and manage.
Page 6
The following table describes various details about Ethernet. Characteristic
Description Ethernet uses one or more of the following networking topologies:
Topology
Media Access Method
•
Physical bus, logical bus
•
Physical star, logical bus
•
Physical star, logical star
Ethernet uses a contention-based media access method called Carrier Sense, Multiple Access/Collision Detection (CSMA/CD). Devices use the following process to send data. 1. Because all devices have equal access (multiple access) to the transmission media, a device with data to send first listens to the transmission medium to determine if it is free (carrier sense). 2. If it is not free, the device waits a random time and listens again to the transmission medium. When it is free, the device transmits its message. 3. If two devices transmit at the same time, a collision occurs. The sending devices detect the collision (collision detection) and send a jam signal to notify all other hosts that a collision has occurred. 4. Both devices wait a random length of time before attempting to resend the original message (called backoff ). Note: When switches are used on an Ethernet network, collisions disappear. Most devices can detect this and will turn off collision detection and use fullduplex communication. Ethernet supports the following cable types: •
Transmission Media
Physical Addresses
The following table compares the characteristics of various Ethernet implementations. Category Standard
•
Fiber optic, most commonly used in high-speed applications such as servers or streaming media.
•
Coaxial for older Ethernet implementations (often called thinnet or thicknet networks).
•
NICs with transceivers
•
Hubs
•
Switches
•
Routers
Ethernet devices are identified using the MAC address which is burned into the network interface card.
10 G Ethernet
Frames
The preamble is a set of alternating ones and zeroes terminated by two ones (i.e., 11) that marks it as a frame.
•
The destination address identifies the receiving host's MAC address.
•
The source address identifies the sending host's MAC address.
•
The data, or the information that needs to be transmitted from one host to the other.
•
Optional bits to pad the frame. Ethernet frames are sized between 64 and 1518 bytes. If the frame is smaller than 64 bytes, the sending NIC places "junk" data in the pad to make it the required 64 bytes.
•
The CRC (cyclical redundancy check) is the result of a mathematical calculation performed on the frame. The CRC helps verify that the frame contents have arrived uncorrupted.
Network+ N10-003 Cheat Sheet
Maximum Segment Length
100 meters
10BaseFL
10 Mbps (multimode cable)
Fiber optic
1,000 to 2,000 meters
100BaseT4
100 Mbps (half duplex) 200 Mbps (full duplex)
Twisted pair (Cat5 or higher) 100 meters Uses 4 pairs of wires
100BaseFX
100 Mbps (multimode cable)
Fiber optic
412 meters
1000BaseT
UTP Twisted pair (Cat5e)
100 meters
1000BaseCX (short copper)
25 meters, used Special copper within wiring (150 ohm), STP closets
1,000 Mbps (half duplex) 1000BaseSX 2,000 Mbps MM fiber –50 (full duplex) Micron (short)
220 to 550 meters depending on cable quality
1000BaseLX (long)
550 (multimode) MM fiber optic or 10 Km (singleSM fiber optic mode)
10 GBaseSR
MM Fiber optic
10 GBaseLR 10 Gbps (full SM Fiber optic duplex only) 10 GBaseER
SM Fiber optic
2 to 300 meters 2 to 10 kilometers 2 to 40 kilometers
You should also know the following facts about Ethernet: •
The maximum cable length for UTP Ethernet "T" implementations is 100 meters for all standards.
•
You may also see 10Base2 and 10Base5 Ethernet implementations, both of which are older implementations using coaxial cable. You will not be required to know these for the Network+ exam.
•
Ethernet standards support a maximum of 1024 hosts.
A frame is a unit of data that is ready to be sent on the network medium. Ethernet frames contain the following components: •
Cable Type
10BaseT
Fast Ethernet
Gigabit Ethernet
Bandwidth
10 Mbps (half duplex) Twisted pair 20 Mbps (full (Cat3, 4, or 5) duplex)
Ethernet
Unshielded twisted-pair cables (UTP) with RJ-45 connectors. This is the most common transmission medium used for Ethernet.
Devices used on Ethernet networks include: Networking Devices
Ethernet Specifications Ethernet standards are defined by the work of the IEEE 802.3 committee.
Token Ring Facts Token ring began as a proprietary networking standard developed by IBM. Now there is a public token ring networking standard created by the IEEE 802.5 committee and other vendors that manufacture token ring components. Token ring was a popular networking architecture that is quickly being replaced by Ethernet. However, you may still encounter token ring in some existing networks. Token ring networks have the following advantages: •
There are no collisions.
•
The transmitting host can use the entire bandwidth to send its data.
•
You can assign priorities to designated hosts to give them greater network access.
•
Troubleshooting broken network connections is made easy by built-in diagnostic devices.
Page 7
Token ring networks have the following disadvantages: The following table describes various details about FDDI.
•
Higher cost than Ethernet networks.
•
Slower operating speeds than Ethernet networks.
Characteristic
Description
Topology
FDDI networks are wired using a physical ring, logical ring topology or a physical star, logical ring topology. FDDI uses dual counter-rotating rings for data (two rings are used, with each sending data in the opposite direction).
Media Access Method
FDDI uses a token-passing media access method. FDDI provides a ring wrapping feature which uses both rings for sending data. If a break occurs in one ring, data can be sent on the other ring, thus isolating the break.
Transmission Media
As the name suggests, FDDI networks use fiber optic cables. Newer specifications allow the use of Cat 5 UTP (sometimes called CDDI ).
The following table describes various details about token ring. Characteristic
Description
Topology
Token ring networks are wired using a physical star, logical ring topology (a physical ring topology is also possible but not common).
Media Access Method
Token ring uses a token-passing media access method: 1. A token passes from host to host. 2. When a host needs to transmit, it grabs the token. 3. The host encapsulates its data into a frame and transmits it around the ring. 4. Each host examines the recipient address of the frame until it arrives at the recipient. 5. The recipient transmits a success frame to the transmitting host to confirm that it received the data. 6. Once it receives a success frame, the sending host creates and releases a new token.
FDDI networks use fiber optic connectors. SC and ST are both fiber optic connectors and can be used on an FDDI network though the MIC connector is the most common. Two types of devices might be connected to an FDDI network:
Networking Devices
A host can communicate directly only with machines immediately upstream or downstream from them in the data flow. A broken ring results when a host fails. Other hosts on the network can no longer communicate with any hosts downstream from the break. Token ring networks support the following transmission media: •
Transmission Media
STP and UTP
•
Fiber optic
Token Ring uses several types of drop cables to connect workstations to the MSAU (multistation access unit): •
•
Networking Devices
Speed
Type 1 or Type 2 shielded twisted pair (STP) wiring with a DB-9 connector. Category 3 (4 Mbps) or Category 5 (16 Mbps) unshielded twisted pair (UTP) cabling with RJ-45 connectors.
The central connecting point for a token ring network is an MAU (multi-station access unit). You can uplink MAUs by connecting patch cables between the RI (ring in) and RO (ring out) ports on each MAU. Be aware that you must connect both sets of RI and RO ports on both MAUs to make sure the ring is complete.
•
LAN Backbones--The FDDI network backbone for the rest of the network.
•
Computer-room Networks--These networks performance mainframes and other computers.
•
High-speed LANs--The speed of FDDI is ideal for networks with high data traffic, powerful workstations (engineering or computeraided design workstations), or networks requiring high transfer rates (i.e. digital video).
Network+ N10-003 Cheat Sheet
forms
a
high-speed
connect
•
Single Attachment Stations (SAS), also called Class B devices, attach to one ring (primary).
FDDI operates at 100 Mbps on a single ring. When both rings are used, data can travel at an effective rate of 200 Mbps.
Additional Specifications
FDDI can operate over distances up to 200 km (124 miles). When two rings are used, the distance is limited to 100 km (62 miles). FDDI networks can support up to 1000 devices.
Infrared Facts Infrared wireless networking employs light waves that are outside of the visible light spectrum. It uses light from three regions: •
The near IR band (the light wave closest to the color red)
•
The intermediate (IM) IR band
•
The far IR band
Infrared devices can operate in one of two modes: Method
Description •
Devices must have a direct LoS (line-of-sight) connection and the maximum distance between devices is 1 meter.
•
Because of the LoS connection requirement, communication signals are easily interrupted.
•
Diffuse mode (also called scatter mode) operates by broadcasting a large beam of light rather than a narrow beam. It does not require LOS connections.
•
Despite its advantages, diffuse mode still operates under range limitations. The IR access point and devices must be in the same room with each other.
•
Diffuse mode is also subject to signal disruptions (such as from obstructions).
Line of Sight (LoS)
Common token ring networks operate at either 4 or 16 Mbps. Newer standards include 100 Mbps and Gigabit (1000 Mbps) token ring, although these have never been widely adopted.
FDDI Facts Fiber Distributed Data Interface (FDDI) is a fiber-optic, token-ring architecture originally standardized by the American National Standards Institute (ANSI). This standard is in many respects similar to the IEEE 802.5 standard, but is characterized by higher data transfer rates (100 to 200 Mbps). FDDI is typically implemented in situations where high data transfer rates are needed, including:
Dual Attachment Stations (DAS), also called Class A devices, attach to both rings (primary and secondary).
Speed
Special IBM-type cables
•
•
Diffuse Mode
You should know the following facts about wireless IR: •
IR data transfers occur at 4 Mbps.
•
IR networks are very insecure because the signals are not encrypted, and they can be easily intercepted.
•
A common use for IR in networking is in transferring data between a handheld or notebook computer and a desktop computer.
high-
Wireless Architecture Facts
Page 8
When you implement a radio frequency wireless network, you use radio waves rather than wires to connect your hosts. Radio waves are considered unbounded media because, unlike wires, they have nothing to encase them. The most commonly used frequency for wireless networking is the 2.4 GHz frequency.
•
Note: Many wireless access points include ports (or hubs, switches, or routers) to connect the wireless network to the wired portion of the network.
The following table describes details of a wireless networking architecture. Characteristic Description
Signaling Method
Frequency Hopping Spread Spectrum (FHSS)
DirectSequence Spread Spectrum (DSSS)
FHSS uses a narrow frequency band and 'hops' data signals in a predictable sequence from frequency to frequency over a wide band of frequencies. Because FHSS hops between frequencies, it can avoid interference on one cable as it shifts to another. Hopping between frequencies increases transmission security by making eavesdropping and data capture more difficult. Because FHSS shifts automatically between frequencies, it can avoid interference that may be on a single frequency. FHSS applies to 802.11 is still in use with Bluetooth. The transmitter breaks data into pieces and sends the pieces across multiple frequencies in a defined range. DSSS is more susceptible to interference and less secure then FHSS. •
Ad hoc
Works in peer-to-peer mode without a WAP (the wireless NICs in each host communicate directly with one another)
•
Uses a physical mesh topology
•
Cheap and easy to set up but cannot handle more than four hosts
•
Requires special modifications to reach wired networks
Wireless Standards Radio frequency wireless networking standards are specified by various IEEE 802.11 committees. Wireless networking technologies Standard
Data Speed
Frequency
Transmission Type
Topology
Range
IEEE 802.11 Legacy
2 Mbps
2.4 GHz
FHSS or DSSS
Point-point
30 m
IEEE 802.11b WiFi
11 Mbps
2.4 GHz
DSSS with CCK
Point-point
30 m
IEEE 802.11a WiFi
54 Mbps
5 GHz
OFDM
Point-point
30 m
IEEE 802.11g WiFi
54 Mbps
2.4 GHz
>20 Mbps: OFDM,
View more...
Comments